公司规模
Large Corporate
地区
- America
- Asia
国家
- United States
- Australia
- Canada
- Thailand
产品
- Forcepoint SimShield
技术栈
- Cross Domain Solutions
- Test and Training Enabling Network Architecture (TENA) protocol
实施规模
- Enterprise-wide Deployment
影响指标
- Cost Savings
- Productivity Improvements
技术
- 网络安全和隐私 - 网络安全
适用行业
- 国家安全与国防
用例
- 网络安全
服务
- 系统集成
- 培训
关于客户
太平洋空军 (PACAF) 和第 353 战斗训练中队 (353d CTS) 运营和管理首屈一指的联合战斗训练场地 - 红旗-阿拉斯加 (RF-A)。RF-A 演习在埃尔森空军基地和埃尔门多夫-理查森联合基地的联合太平洋阿拉斯加靶场 (JPARC) 举行。JPARC 是世界上最大的仪器化空中、地面和电子作战训练场。RF-A 每年举行多次联合和联军演习,提供具有现实威胁和目标的相关真实空中和地面作战场景。多达 90 架飞机和 2,000 名人员参加 RF-A 战术演习,演习覆盖空军/陆军联合管理的 JPARC 内 66,000 平方英里的训练空域和 160 万英亩崎岖土地。JPARC 拥有价值超过 2 亿美元的设备和仪器,以支持作战人员训练演习。
挑战
太平洋空军 (PACAF) 和第 353 战斗训练中队 (353d CTS) 运营和管理首屈一指的联合战斗训练场地 - 红旗-阿拉斯加 (RF-A)。RF-A 演习在埃尔森空军基地和埃尔门多夫-理查森联合基地的联合太平洋阿拉斯加靶场 (JPARC) 举行。JPARC 是世界上最大的仪器化空中、地面和电子作战训练场。RF-A 每年举行多次联合和联军演习,提供具有现实威胁和目标的相关真实空中和地面作战场景。多达 90 架飞机和 2,000 名人员参加 RF-A 战术演习,演习覆盖空军/陆军联合管理的 JPARC 内 66,000 平方英里的训练空域和 160 万英亩崎岖土地。JPARC 拥有价值超过 2 亿美元的设备和仪器,以支持作战人员训练演习。除了规模和成本之外,太平洋空军还承担着确保敏感数据不被访问或泄露给未经授权的各方或系统的责任——这在训练多国联军时尤其重要。为了为作战人员提供最真实的训练,包括多个国家和多个权限级别,需要一种跨域解决方案。为了最好地支持联合训练所需的实时、虚拟和建设性 (LVC) 方面,这种跨域解决方案必须接近实时,支持灵活的协议,并能够获得秘密和低于互操作性 (SABI) 级别的连接授权 (ATC)。
解决方案
为了缓解敏感数据保护问题,同时允许不同权限级别的参与者一起训练,PACAF 采用了 Forcepoint SimShield 跨域解决方案。Forcepoint SimShield 允许不同机密级别的 LVC 资产之间实现安全的双向互操作性。Forcepoint SimShield 支持 JPARC 和 JDEWR 使用的基于标准的测试和训练支持网络架构 (TENA) 协议。通过在架构内部署 Forcepoint SimShield,JPARC 可以在整个训练环境中利用所有设备和子系统的安全双向集成和交互。JPARC 环境中的 Forcepoint SimShield 部署于 2009 年 6 月获得认证和认可,随后被列入统一跨域管理办公室 (UCDMO) 基线列表。Forcepoint SimShield 目前是 UCDMO 基线列表中唯一的 TENA 跨域解决方案。
运营影响
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Enhancing Security and Compliance in Remitly's Global Money Transfer Service with Fastly
Remitly, an online remittance service, was faced with the challenge of securing its proprietary global transfer network. The company needed a security solution that could meet PCI requirements and protect customers' sensitive transactions through its mobile application. The solution had to be capable of defending against new and emerging attack types without impacting performance. Remitly also had to deal with irregular traffic patterns, such as a sudden spike in account transfers from a small network segment on the Pacific coastline of South America. The company needed to determine in real time whether such traffic indicated an attack or valid requests. A traditional web application firewall (WAF) would not be able to distinguish this traffic, potentially leading to customer frustration if the IP was blacklisted.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.
Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.
Case Study
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraph
MITRE, a federally-funded, not-for-profit company that manages seven national research and development laboratories in the United States, was grappling with the challenge of managing an influx of cybersecurity data. The constant changes in network environments were impacting the security posture of U.S. government agencies. Intrusion alerts, anti-virus warnings, and seemingly benign events like logins, service connections, and file share access were all potentially associated with adversary activity. The cybersecurity researchers at MITRE needed to go beyond rudimentary assessments of security posture and attack response. This required merging isolated data into higher-level knowledge of network-wide attack vulnerabilities and mission readiness. The challenge was not the lack of information, but the ability to assemble disparate pieces of information into an overall analytic picture for situational awareness, optimal courses of action, and maintaining mission readiness. The team also struggled with fully comprehending a given security environment and mapping all known vulnerabilities.
Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.